Question 1
The process begins by acquiring a search warrant which legally permits the investigators to physically seize the devices required and examine data contained on these devices (Casey, 2011). The next step involves searching and seizing the property in order to document the chain of custody. The chain of custody helps guarantee the integrity of the seized devices (National Institute of Justice (U.S.). (2010). The third step is to extract information from the device and hold the device to the legally required standards and integrity. The next step involves analyzing the results and verifying the accuracy and truthfulness by cross checking the obtained data. Finally, findings are developed which include all relevant information likely to be pertinent to the case at hand (Casey & Altheide, 2010).
Question 2
As a witness, the first thing I did was to take an oath swearing to the court that my testimony is nothing but the truth and to attest to the findings that were compiled from the recovered devices (National Institute of Justice (U.S.). (2010). Then, upon entering the witness stand, I would say that I was given a legal search warrant to look for the computer and other related electronic gadgets in the specified area. I would proceed with my testimony and explain my involvement at the scene of crime. As a forensic examiner and a key witness, it is my responsibility to be adequately prepared to respond to any questions about the investigation (Casey & Altheide, 2010).
Delegate your assignment to our experts and they will do the rest.
Question 3
After seizing the computer evidence, I took the codes and pins of the individuals involved (National Institute of Justice (U.S.). (2010). Also, I gathered the cables, peripherals, manuals and the charges of these devices. Next, I had to establish that the emails I found on the devices’ hard drives existed on the seized gadgets at the time of the seizure. At this point, I used the chain of device to authenticate that the emails were present on the seized hard drives on the exact day the devices were seized (National Institute of Justice (U.S.). (2010).
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet . Amsterdam [etc.: Elsevier Academic Press.
Casey, E., & Altheide, C. (2010). Handbook of digital forensics and investigation . Amsterdam: Elsevier/Academic.
National Institute of Justice (U.S.). (2010). Electronic crime scene investigation: A guide for first responders . Darby, PA: Diane Publishing.